Zeljka Zorz
![Twitter](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101156/twitter-400x200.jpg)
State-sponsored actors may have abused Twitter API to de-anonymize users
A Twitter API that’s intended to help new account holders find people they may already know on Twitter has been abused by known and unknown actors to tie usernames to …
![virus](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/03115844/virus-mouth-400x200.jpg)
Wuhan coronavirus exploited to deliver malware, phishing, hoaxes
The Wuhan coronavirus continues to spread and create anxiety across the globe, allowing malicious individuals and groups to exploit the situation to spread fake news, malware …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/31160247/email-smoke-red-400x200.jpg)
Layering diverse defenses is crucial for stopping email attacks
Despite heading a company that provides a technological solution for stopping targeted email attacks, Evan Reiser, CEO of Abnormal Security, knows that technology is not the …
![Google OpenSK](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/31105458/google-opensk-400x200.jpg)
Make your own security key with Google’s OpenSK
Google has open-sourced OpenSK, firmware that, combined with an affordable chip dongle, allows you to make your own security key to use for authentication purposes. About …
![Xbox](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/31104202/xbox-logo-400x200.jpg)
Microsoft invites gamers and researchers to new Xbox bug bounty program
Gamers, security researchers, and technologists have been invited to identify security vulnerabilities in Xbox network and services and report them to Microsoft. Bounty …
![United Nations](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/30144840/un-flag-broken-400x200.jpg)
UN hacked: Attackers got in via SharePoint vulnerability
In summer 2019, hackers broke into over 40 (and possibly more) UN servers in offices in Geneva and Vienna and downloaded “sensitive data that could have far-reaching …
![Magento](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104429/magento-400x200.jpg)
Magento patches critical code execution vulnerabilities, upgrade ASAP!
Adobe-owned Magento has plugged multiple critical vulnerabilities in its eponymous content management system, the most severe of which could be exploited by attackers to …
![hole](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112510/hole-400x200.jpg)
Critical RCE flaw in OpenSMTPD, patch available
Qualys researchers have discovered a critical vulnerability (CVE-2020-7247) in OpenBSD’s OpenSMTPD mail server, which can allow attackers to execute arbitrary shell commands …
![Windows 7](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/29114259/windows7-malware-400x200.jpg)
Most AV vendors will continue to support their products under Windows 7
Earlier this month, Windows 7 – the most beloved Windows version up to date – has reached end-of-support. Businesses of all sizes can still pay to receive extended …
![GE Carescape](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/24124907/ge_carescape-green-400x200.jpg)
MDhex vulnerabilities open GE Healthcare patient monitoring devices to attackers
Researchers have discovered six critical and high-risk vulnerabilities – collectively dubbed MDhex – affecting a number of patient monitoring devices manufactured …
![Citrix](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/23145946/citrix-logo-red2-400x200.jpg)
IoC Scanner shows if Citrix appliances have been compromised via CVE-2019-19781
Citrix and FireEye have teamed up to provide sysadmins with an IoC scanner that shows whether a Citrix ADC, Gateway or SD-WAN WANOP appliance has been compromised via …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09093009/cisco-400x200.jpg)
It’s time to patch your Cisco security solutions again
Cisco has released another batch of security updates and patches for a variety of its offerings, including many of its security solutions. Security fixes for security …
Featured news
Sponsored
Don't miss
- Grype: Open-source vulnerability scanner for container images, filesystems
- Signatures should become cloud security history
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks